Amazon cover image
Image from Amazon.com

Malware forensic field guide for Linux systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor.

By: Contributor(s): Material type: TextTextPublisher: Waltham, Mass. : Syngress / Elsevier, 2014Description: xxxix, 574 pages ; 23 cm. illustrations ( same color)Content type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781597494700
  • 1597494704
Subject(s): DDC classification:
  • 005.8 22
LOC classification:
  • QA76.9.A25 MAL
  • QA76.76.C68 M32 2014
Contents:
Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.
Summary: Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

includes index

Includes bibliographical references and index.

Malware incident response -- Linux memory forensics -- Postmortem forensics -- Legal considerations -- File identification and profiling -- Analysis of a malware specimen.

Malware Forensics Field Guide for Linux Systems is a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. The book covers analysis of a suspect program, analyzing physical and process memory dumps for malware artifacts, extracting malware and associated artifacts from Linux systems, legal considerations, and more. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator or analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. A compendium of on-the-job tasks and checklists. Specific for Linux-based systems in which new malware is developed every dayAuthors are world-renowned leaders in investigating and analyzing malicious code.

There are no comments on this title.

to post a comment.
Share